Personal computer internet security system

a technology for internet security and personal computers, applied in the direction of program control, unauthorized memory use protection, instruments, etc., can solve the problems that cyber-terrorists, internet predators, hackers, internet predators cannot breech a computer system running the present inventive software, and the implementation of the present inventive software technology is uncomplicated

Inactive Publication Date: 2006-12-05
BURNT HICKORY COMPANY
View PDF9 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0013]The present invention includes a method for securing the primary data on a personal computer from intrusion by malicious code derived from an external data source. Generally, the method comprises the steps of: first installing a software application embodying the present inventive software on the subject computer. Then the software application is executed to initially establish the isolated operating environment on the computer, the isolated operating environment including a secondary operating system, and ready for activation. Subsequently initiating an external data source interface session activates further execution the software application, including allocating volatile memory (in R

Problems solved by technology

Further, hackers, cyber-terrorists and internet predators cannot breech a computer system running the present inventive software even if they

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal computer internet security system
  • Personal computer internet security system
  • Personal computer internet security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]Referring now to the drawings, the details of preferred embodiments of the present invention are graphically and schematically illustrated. Like elements in the drawings are represented by like numbers, and any similar elements are represented by like numbers with a different lower case letter suffix.

[0027]The present Personal Computer Internet Security System protects the files of a user's stand-alone or personal computer from being affected by any malicious code contained in a file downloaded from an external data source, such as the Internet, and from being accessed from the Internet (e.g., via a “trojan”). Although the present system 10 comprises a stand-alone computer device such as a PC as shown in FIG. 1, it can be adapted to a computer network, such as an Intranet as shown in FIG. 2. As shown in FIGS. 1 and 2, the Internet 14 is typically accessed by a computer 20 (or for an intranet 18, by an internet server 21, see FIG. 2) via an Internet node 16. Depending on the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An intrusion secure personal computer system includes a central processing unit, a data storage means, a memory means, a primary operating system, a virtual machine operating system providing an isolated secondary operating environment functioning separate from the primary operating system and controlling operations of the personal computer system within the isolated secondary operating environment and at least one input/output (I/O) connection in operative communication with an external data source, where the personal computer system is secured from malicious code contained in a file downloaded from the external data source.

Description

[0001]The present application claims the benefit of prior filed U.S. Provisional Patent Applications, Ser. Nos. 60 / 408,456 filed 5 Sep. 2002, 60 / 413,962 filed 26 Sep. 2002, and 60 / 430,438 filed 2 Dec. 2002, to which the present application is a U.S. non-provisional patent application.FIELD OF THE INVENTION[0002]The present invention is in the field of support for electrical computers and digital processing systems. More specifically, the present invention relates to security software and processes for protecting a personal-type computer system's hardware, software and data from destruction, unauthorized modification or unauthorized access due to malicious computer code derived from an external data source.BACKGROUND OF THE INVENTION[0003]It is well known that computer systems are subject to attack by intruders who utilize malicious computer code downloaded onto the system to steal or corrupt data or applications resident on a computer system, or to otherwise compromise the integrity...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F7/04G06F15/16G06F9/44H04K1/00H04L9/00G06F21/00
CPCG06F21/53G06F9/45558G06F2009/45587
Inventor GOODMAN, REGINALD A.COPELAND, SCOTT RUSSELL
Owner BURNT HICKORY COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products